Amazon cover image
Image from Amazon.com

Network security : private communications in a public world

Contributor(s): Material type: TextTextPublication details: Noida : Pearson, ©2024Edition: 3rd edDescription: xxi, 429 p. : ill. ; 24 cmISBN:
  • 9788196874339
Subject(s): DDC classification:
  • 005.8 KAU-N
Contents:
1. Introduction 2. Introduction to Cryptography 3. Secret Key Cryptography 4. Modes of Operation 5. Cryptographic Hashes 6. First-Generation Public Key Algorithms 7. Quantum Computing 8. Post-Quantum Cryptography 9. Authentication of People 10. Trusted Intermediaries 11. Communication Session Establishment 13. SSL/TLS and SSH 14. Electronic Mail Security 15. Electronic Money 16. Cryptographic Tricks 17. Folklore
Summary: "With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies"--
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds Course reserves
Books Books IIITD General Stacks Computer Science and Engineering 005.8 KAU-N (Browse shelf(Opens below)) Available 013044
Books Books IIITD General Stacks Computer Science and Engineering 005.8 KAU-N (Browse shelf(Opens below)) Available 013045
Books Books IIITD General Stacks Computer Science and Engineering 005.8 KAU-N (Browse shelf(Opens below)) Available 013047
Books Books IIITD General Stacks Computer Science and Engineering 005.8 KAU-N (Browse shelf(Opens below)) Available 013043
Books Books IIITD Reference Computer Science and Engineering REF 005.8 KAU-N (Browse shelf(Opens below)) Not for loan 013046

Advanced Programming UG MNS24

Total holds: 0

1. Introduction 2. Introduction to Cryptography 3. Secret Key Cryptography 4. Modes of Operation 5. Cryptographic Hashes 6. First-Generation Public Key Algorithms 7. Quantum Computing 8. Post-Quantum Cryptography 9. Authentication of People 10. Trusted Intermediaries 11. Communication Session Establishment 13. SSL/TLS and SSH 14. Electronic Mail Security 15. Electronic Money 16. Cryptographic Tricks 17. Folklore

"With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies"--

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in